CVE-2023-46671

An issue was discovered by Elastic whereby sensitive information may be recorded in Kibana logs in the event of an error. Elastic has released Kibana 8.11.1 which resolves this issue. The error message recorded in the log may contain account credentials for the kibana_system user, API Keys, and credentials of Kibana end-users. The issue occurs infrequently, only if an error is returned from an Elasticsearch cluster, in cases where there is user interaction and an unhealthy cluster (for example, when returning circuit breaker or no shard exceptions).
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*

History

18 Dec 2023, 18:01

Type Values Removed Values Added
CPE cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CWE CWE-532
References () https://discuss.elastic.co/t/8-11-1-7-17-15-security-update-esa-2023-25/347149 - () https://discuss.elastic.co/t/8-11-1-7-17-15-security-update-esa-2023-25/347149 - Mitigation, Vendor Advisory

13 Dec 2023, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-13 07:15

Updated : 2024-02-05 00:22


NVD link : CVE-2023-46671

Mitre link : CVE-2023-46671

CVE.ORG link : CVE-2023-46671


JSON object : View

Products Affected

elastic

  • kibana
CWE
CWE-532

Insertion of Sensitive Information into Log File